Manual Chapter :
Managing BIG-IQ Fraud Protection Service
Applies To:
Show VersionsBIG-IQ Centralized Management
- 8.3.0, 8.2.0, 8.1.0, 8.0.0, 7.1.0
Managing BIG-IQ Fraud Protection Service
Fraud Protection Service overview
BIG-IQ® Fraud Protection Service (FPS) sends alerts to users whenever
they are victims of malware or phishing attacks. BIG-IQ filters all alerts into different
types and displays them for you to monitor. FPS has the ability to create rules to modify
alerts, rules for forwarding alerts, or download rules from the Security Operations Center
(SOC). Types of alerts include:
- Uninspected Alerts
- This list contains all alert types that have a status of new.
- Monitored Alerts
- This list contains all monitored alert types.If you have configured fraud protection accounts, then you can view only the alerts that have been specified for your account to view.
- Phishing Alerts
- Phishing alerts include phishing user, copied pages, and user defined phishing. These alerts are created when a phishing victim enters user credentials onto a phishing web site, or when a phishing site has been detected by JavaScript. The user name that appears in the alert is the user name that is entered into the phishing site.
- Malware Alerts
- Malware alerts are separated into generic malware, targeted malware, external scripts, page modification, and user defined malware. The Malware Detection component thus enables the organization to take the necessary steps to mitigate the risks of the attack in real time. This component helps the organization to keep track of its affected users and reveal malicious money transaction attempts.
- Suspicious Transactions
- Suspicious Transactions include browser automation, remote access tools, transaction modification, and user defined. Suspicious transactions prevent automatic requests to the application's server by confirming that the request was made by a human and not issued automatically. Automatic requests can be issued by a Trojan attack injecting a malicious JavaScript code to the user's browser in order to perform an automatic money transfer to the attacker's account, or by random bots attempting to automatically scrape data from the application automation.
- Suspicious Logins
- Suspicious logins include stolen credentials and user inspection. These alerts provide protection against Trojan attacks, providing an encryption for the information at the application layer on the client side. This ensures that the information that is exposed to the Trojan attack will be encrypted. The encryption is conducted on the client side, using a public key generated by the web server and provided uniquely per session. When the encrypted information is received by the web server, it is decrypted using a private key that is kept on the server side.
- Mobile
- Mobile alerts integrate with the applications of financial service providers, improving protection against the aforementioned threats and provides alerts received on possible attacks. Mobile alerts neutralizes local threats found on customers’ mobile devices, without altering the user experience. These alerts are created when the system detects an infected mobile device. Alert types that are included in this category are Mobile Malware, Mobile Man-in-the-middle (MITM), Mobile Security, and User Defined. Prevents phishing, Trojan attacks, and pharming attacks on mobile devices in real time, through detection, prevention, and application-level encryption.
- Validation Errors
- Validation error alerts are created when the expected cookie is missing or corrupted. Validation errors include transaction errors, encryption errors, missing components, and mobile errors.
- Unfiltered Alerts
- Unfiltered alerts are unfiltered views of all alerts except those that have the status of Ignore.
- Saved Filters
- Saved filters is a list of custom filters that you create and save. These are unique to each user. Saved filters are helpful if you would like to create your own view of alerts. If you are trying to track down a specific type of attack, you can save a unique filter to repeatedly check on a specific type of alert. The BIG-IQ® Fraud Protection Service provides a rich set of querying features which allow you to quickly and efficiently locate alerts that you are interested in.
FPS Alerts overview
There are a number of things you can do to specify the response to different kinds of
alert types.
Each alert type has its own user interface, but the controls used to edit the rules that
govern the response to these alerts are very similar.
Most alert types are organized into groups. On any list screen, you can click the little
black triangle to expand the list.
- To access the Filter Alerts screen, click theFilterbutton at the top left of the screen. On the Filter Alerts screen you can view the existing query that defines the current alert rule. You can specify additional detail to further refine the query or create a new custom query.
- To refresh the list of alerts on the screen, clickRefresh.
- To create a rule based on an alert, select the check box of the alert you want to use as the basis for the rule, and clickCreate Rule.
- To filter the list of alerts so that only alerts generated during one session are displayed, select the check box of the alert you are interested in, and clickFilter Related.
- To export one or more alerts files to a CSV file that you can edit or inspect, clickMore, and then selectExport.
- To change the status for an alert, select the check box for that alert, clickMore, and then selectChange Status.If all the check boxes are selected in a list, you can choose to either change the status for all of the alerts that are in view, or change the status for all of the alerts that match the query.
- To remove an alert, select the check box for that alert, clickMore, and then selectDelete.If all the check boxes are selected in a list, you can choose to either remove all of the alerts that are in view, or remove all of the alerts that match the query.
When you select a single alert, two changes take place:
- AFilter Relatedbutton becomes active. Click this button to view only alerts that have the same session global unique identifier (GUID) as the selected alert.
- A preview pane opens to show you details about the selected alert.
- From theFiltercontrol, select the type of match (Contains, orExact) that you want to use.
- In theFilterfield, type the filter criteria you want to use, and press Enter.
- AFiltered byfield displays the alert criteria you applied, and the screen displays only alerts that match that criteria.
- To see the rest of the alerts again, click theXto clear your filtered by alert criteria.
To display additional information about a specific alert, select the
check box that corresponds to it. A preview pane opens.
When you select a single alert, a preview pane opens to show you details
about the selected alert. The tabs that display depend on what data is available for the
selected alert.
Details |
This tab displays details about the URL that triggered the alert.
|
HTML |
This tab is visible only if the alert includes these details. It shows you
the raw HTML that was included in the alert. |
Data |
This tab is visible only if the alert includes these details. It shows
you the raw HTML and other data that was extracted for further diagnosis of
the alert condition. If the alert type
is External Sources, the alert type is 6 and the alert component is 5 and
the value contains the forbidden added HTML element and its contents in
escaped base64 format. |
About |
This tab gives a brief summary of details about the alert type. |
Advanced |
This tab displays the exact query that was sent in the alert. This
information can be used to debug alerts and understand the cause of the alert.
It is helpful for the Security Operations Center (SOC). |
Add an advanced query filter
Before you can perform this task, you must be logged in as Admin.
BIG-IQ Fraud Protection Service provides a rich set of querying
features that allow you to quickly and efficiently locate the alerts that you are
interested in.
When you select the
Filter
button from an alerts screen, or
when you select add/edit from the Saved Filters screen, you see a dialog box that
allows you to specify what alerts you want to filter for.The screen provides the most common filters in list and text boxes, but you can
specify additional filters. The filters that display initially depend on the type of
alert you are configuring.
- At the top of the screen, clickConfiguration.
- On the left, click, and then clickAlerts.
- On the left, select the type of alert for which you want to specify advanced filter alerts.The Filter Alerts screen opens.
- To add filter details, click theFilterbutton.The Filter Alerts popup screen opens.
- Complete the Filter Alerts screen:
- ForFilter Name, if you want to save this query for future use, type a name for this set of query details.
- ForCategory, select one or more categories to specify the type of alert.
- ForDate, you can specifylast 2 weeks,last month,last three months,last six months, or select a custom date range. If you only specify a start date, BIG-IQ selects all alerts from the start date to the current date.
- ForAlert Severity, type the minimum and maximum severity of the alerts that you want to match.If the maximum is not entered, the default is 100.
- ForStatus, if you choose one of the options, only alerts of that status are shown.If multiple status are needed, then specify them in theAdditional Query Parameterfield (near the bottom of the screen).
- ForLocation, select the geographic location on which you want to filter.
- ForUser, type the name of the user that triggered the alert.You can use a wildcard*. For examplep*matches all users whose name starts with the letter P.
- ForDomain, type the domain of the site that was in use when the alert was sent.You can use a wildcard*. For examplep*matches all host domains whose name starts with the letter P.You can also type the domain of the phishing site or the host of the site that was detected.
- ForClient IP, type the IP address of the victim of the alert in which you are interested.
- ForAlert URL, type the source URL that caused the alert.
- ForGuid, type the unique identifier for the set of alerts that make up one session.To find the guid, select the alert, and then click theAdvancedtab. Under Query Parameters, look forfpm_guid.
- ForAdditional Query Parameters, if what you want cannot be specified with the quick selections, you can use the query language.The format for these query parameters is:key1: value1 key2: value2 (key3:value3 OR key4).ORis implied if it is not supplied.The query string syntax is parsed into a series of terms and operators. A term can be a single word or a phrase. Note that phrases must be surrounded by double quotes. In general the query string syntax observes the Lucene query syntax. The following characters are reserved and cannot be used in a query:
For example:+ - = && || > < ! ( ) { } [ ] ^ " ~ * ? : \ /(alertType:6 OR alertType:8) language:*usFor a list of advanced query parameters refer toAdvanced Query Parameter Syntax.
- ClickSave.
Additional Query Parameters
If what you want can not be specified with the quick selections, you can use the query
language. Available query parameters are listed here.
Parameter Name |
What it means |
---|---|
category |
The type of alert. Select one or more categories. If none are selected, the
search will apply to all categories. |
alertUrl |
Type the source URL that caused the alert. |
alertType |
A specific type of alert within a category. |
device |
A specific variation within a type of alert. |
component |
A specific variation within a type of alert. |
domain |
Type the domain of the site that was in use when the alert was sent. You can also
type the domain of the phishing site, or the host of the site that was
detected. |
clientIp |
Type the IP address of the victim of the alert that you are interested
in. |
details |
This parameter can contain many different values depending on the type of
alert. |
device |
The device ID of the machine generating the alert (typically a mobile
device). |
alertId |
A unique ID configured on the BIG-IP® device for each
virtual IP address. |
severity |
Specifies the ID of the customer in the dashboard. When configuring a mobile
security anti-fraud profile, you must ensure that the value you assign here for
Alert Identifier is the same value used for VMobile's
customer parameter in the init iOS method and Android constructor. |
status |
The status assigned by the SOC. |
userAgent |
The user browser type and operating system. |
continent |
The continent code. |
country |
The country code. |
region |
The region code. |
language |
User browser and OS language. |
referer |
The URL of the site that was visited just before the alert URL was
visited. |
uri |
The URI to which the client requested to go. |
user |
Type the name of the user that triggered the alert. |
guid |
Type the unique identifier for the set of alerts that make up one
session. |
rule |
As set by the user in the rule. |
alertDetails |
As set by the user in the rule. |
recommendation |
As set by the user in the rule. |
date |
You can specify last 2 weeks , last
month , last three months , last six
months or select a custom date range. If you only specify a start date,
BIG-IQ® selects all alerts from the start date to the current
date. |
cookie |
Cookie information associated with this alert. |
dateType |
Type the number of days back from which to start the query. |
Create and save a
custom filter
Before you can perform this task, you must be logged in as
Admin.
You can create and save custom filters. This
process is very similar to creating an advanced query filter, except you start with no
default set of filters.
- At the top of the screen, clickConfiguration.
- On the left, click, and then clickAlerts.
- ClickSaved Filters.The Saved Filters screen opens.
- ClickCreateto create a new filter.The New Saved Filter screen opens.
- In theFilter Namefield, type a name for the alert filter.
- ForCategory, select the type of alert from the list.
- For theDate, select from the options in the list.The options are,Last 2 weeks,Last month,Last three months,Last six months, or aCustomdate range. If you only specify a start date, the system selects all alerts from the start date to the current date.
- ForAlert Severity, select the severity level of the alert. TheFromandTofields include numbers ranging from 1 to 100.
- ForStatus, select the status from the list. You can pick one of the options, and only alerts of that status are shown. If you need more than one status, you can specify that in theAdditional Query parameterfield.
- ForLocation, select the location from the list.
- ForUser, type the user name.
- In theDomainfield, type the domain.The system only matches on exact match, and is case sensitive.
- In theClient IPfield, type the client IP address.
- In theAlert URLfield, type the alert URL.
- In theGuidfield, type the unique identifier.
- If what you want can’t be specified with the quick selections, you can use the query language in theAdditional Query Parametersetting. or example:This is the format:key1: value1 key2: value2 (key3:value3 OR key4). For example:(alertType:6 OR alertType:8) after Feb 02 2015 07:56:26 before Feb 10 2015 23:56:26 host:versafe.com alertId:ddd severityGE:2 severityLE:94 status:new rule:rule1
- ClickSave & Close
You have now created and saved alert filters.
Change an alert status
Before you can perform this task, you must be logged in as Admin.
You can change the status of alerts
in Fraud Protection Service. An alert status change is performed by an admin, security
manager, or FPS manager to indicate that an alert has been inspected, and what the
status of the alert is.
- At the top of the screen, clickConfiguration.
- On the left, click, and then clickAlerts.
- ClickUnfiltered Alerts.
- Select the check box of the alert type for which you want to change the status.
- Click theMorebutton, and then selectChange Status.
- UnderSelect the new status to set on alerts, select the new status from the list.NewThe SOC team has not yet handled this item.OpenThe SOC team is currently handling this item.HandleThe SOC team has finished handling this item.MonitorThe SOC team has monitored this item.CloseThe SOC team has closed this item.IgnoreThe SOC team is familiar with the alert and has decided that it is not malicious (the alert is a false positive). Ignored alerts can be seen only when using filters.OfficialThe SOC team has determined that this specific URL is legitimate.
- ClickChange Selected.Changing alert statuses displays while your request is processes.
- ClickClosewhen the alert status change completes.
Remove an alert
Before you can perform this task, you must be logged in as Admin.
You can delete the alerts that you
have created in FPS.
- At the top of the screen, clickConfiguration.
- On the left, click, and then clickAlerts.
- On the left, select the alert type that you want to delete.
- Select the specific alert you want to delete, then click theMorebutton, and selectRemove.If the header check box is selected, when you clickRemoveyou are prompted to select whether you want to remove all of the alerts that are currently selected (only 50 to 75 at a time are selected at a time due to memory constraints), or all the alerts that match the query.
The specified alerts are
deleted.
Export an alert
Before you can perform this task, you must be logged in as Admin.
You can export the alerts that you
have created in FPS.
- At the top of the screen, clickConfiguration.
- On the left, click, and then clickAlerts.
- On the left, select the alert type that you want to export.
- Select the alert you wish to export, then click theMorebutton, and selectExport.
The specified alerts are exported to
a
.csv
file in your Downloads folder.Signature files overview
FPS malware signatures allow the BIG-IP® system to discover generic
malware targeting web sites and mobile apps, and enhances protection of your anti-fraud profile.
It is important to help keep the fraud protection on your system up to date by updating malware
signatures with a signature file provided by F5.
Signature file updates can be downloaded from the F5 Update server or uploaded from a local
server. The upload option is relevant in a case where F5 has provided you directly with a
signature file update.
Signature file updates can be downloaded from the F5 update server either manually or
automatically. If you choose the automatic download option, you can configure the time interval
for the periodic updates.
Downloading a signature file from the F5
update server
This procedure requires at least one BIG-IP device with Fraud Protection Service
discovered on your BIG-IQ system.
Download a malware signature file
from the F5 update server to ensure that you have the most up-to-date protection of your
anti-fraud profile on the BIG-IP system.
- At the top of the screen, clickConfiguration.
- On the left, click.The SIGNATURE FILES and ENGINE FILES menus appear.
- In the SIGNATURE FILES menu, clickSignature File List.
- ClickDownload.The Choose download and install option screen opens.
- Choose one of the following download options:
- Download latest files: Choose this option to download the most up-to-date file but not install it at this time.
- Download latest files and install on All devices:Choose this option to download the most up-to-date file and install it immediately after download on all BIG-IP devices in the cluster.
- Download latest files and install on Active devices:Choose this option to download the most up-to-date file and install it immediately after download on the primary BIG-IP devices in the cluster.
- ClickOK.
The most up-to-date signature file is
downloaded to the BIG-IQ system and appears in the list in the Signature Files List
screen. If you chose the download and install option, the file is pushed to the BIG-IP
devices in the cluster and installed on them.
If you did not choose the download and install
option, you need to manually install the updated signature file to complete the update
of malware signatures on the BIG-IP system.
You can check the
status of the download by going to
and clicking on the name of the signature file in the list. If you
chose the download and install option, check the status at .Uploading a signature file stored
locally
This procedure requires at least one
BIG-IP® device with Fraud Protection Service discovered on your
BIG-IQ® system.
You can upload a locally stored
malware signature file to the BIG-IQ system if you do not want to download the updated
malware signature file from the F5 update server.
- At the top of the screen, clickConfiguration.
- On the left, click.The SIGNATURE FILES and ENGINE FILES menus appear.
- In the SIGNATURE FILES menu, clickSignature File List.
- ClickImport.The Import FPS Signature File screen opens.
- Choose one of the following actions:
- ClickChoose File, and then perform the following steps:
- Navigate to the updated signature file.
- ClickOpen. The file name appears in the Import FPS Signature File screen.
- ClickImportat the bottom of the Import FPS Signature File screen. The updated file now appears in the Signature Files list.
- Drag and drop the updated signature file from its original location to the area labeled Drop Update File Here. After doing this, the Signature Files list appears, showing the updated file.
Manually install the updated
signature file to finish updating malware signatures on the BIG-IP system.
Installing a signature file
Before you can install a signature
update file, you must either download the file from the F5 update server or upload it
locally.
Install a signature update file to
one or more BIG-IP® devices to ensure that you have the most
up-to-date protection of your anti-fraud profile on the BIG-IP system.
- At the top of the screen, clickConfiguration.
- On the left, click.The SIGNATURE FILES and ENGINE FILES menus appear.
- In the SIGNATURE FILES menu, clickSignature File List.
- In the Signature Files list, click the name of the signature file you want to install.The Properties screen for the signature file opens.
- For theInstall to Devicessetting, select the BIG-IP device(s) where you want to install the file.
- From theInstall Tolist, choose whether to install the file on all BIG-IP devices in the cluster or on just the active (primary) devices in the cluster.Once a file is deployed to an active clustered BIG-IP device, a synchronization task will run on the BIG-IP device cluster.
- ClickInstall.The BIG-IQ system pushes the file to the BIG-IP devices that you selected and the file is installed on those devices.
You can check the status of the installation
by going to
and clicking the name of the signature file in the list.Scheduling automatic signature file
updates
This procedure requires at least one
BIG-IP® device with Fraud Protection Service discovered on your
BIG-IQ® system.
Schedule automatic signature file
updates to automate the process of downloading and installing updated malware signature
files according to a specified time interval.
- At the top of the screen, clickConfiguration.
- On the left, click.The SIGNATURE FILES and ENGINE FILES menus appear.
- In the SIGNATURE FILES menu, clickSignature File List.
- ClickSettings.The Settings screen opens.
- ForRemote Updates, select theEnabledcheck box.
- ForInterval, select a time interval for the automatic update.
- If you chooseCustom, select a time interval from the Custom list.
- ForStarting At, choose a date and time for when the automatic update should start.
- If you are using a proxy, select it from theProxylist.
- From theInstall Tolist, choose whether you want the automatic update to install the signature file on all BIG-IP devices in the cluster or on just the active (primary) devices in the cluster.
- ClickSave & Close.The Signature Files list appears.
- Follow these steps for every BIG-IP device that you want to receive the automatic signature file update:
- Go to.
- Click the device name in the Devices List.The device Properties screen opens.
- Under Signature File Version, select theAllow Automatic Installcheck box.
- ClickSave & Close.
Automatic signature file updates are
configured, and will begin on the start date that you selected.
You can check the status of the download and
installation by going to
and clicking the name of the signature file in the list.Engine files overview
The FPS JavaScript Engine allows the BIG-IP® system to discover generic
malware targeting web sites and mobile apps, and enhances protection of your anti-fraud profile.
It is important to help keep the fraud protection on your system up to date by updating the
engine with an engine file provided by F5.
Engine file updates can be downloaded from the F5 update server or uploaded from a local
server. The upload option is relevant in a case where F5 has provided you directly with an engine
file update.
Engine file updates can be downloaded from the F5 update server either manually or
automatically. If you choose the automatic download option, you can configure the time interval
for the periodic updates.
F5 recommends not
using the automatic engine file update option, and to perform engine file updates
manually.
Downloading an
engine file from the F5 update server
This procedure requires at least one BIG-IP device with Fraud Protection Service
discovered on your BIG-IQ system.
Download a JavaScript engine file from the F5
update server to ensure that you have the most up-to-date protection of your anti-fraud
profile on the BIG-IP system.
- At the top of the screen, clickConfiguration.
- On the left, click.The SIGNATURE FILES and ENGINE FILES menus appear.
- In the ENGINE FILES menu, clickEngine File List.
- ClickDownload.The Choose download and install option screen opens.
- Choose one of the following download options:
- Download latest files: Choose this option to download the most up-to-date file but not install it at this time.
- Download latest files and install on All devices:Choose this option to download the most up-to-date file and install it immediately after download on all BIG-IP devices in the cluster.
- Download latest files and install on Active devices:Choose this option to download the most up-to-date file and install it immediately after download on the primary BIG-IP devices in the cluster.
- ClickOK.
The most up-to-date engine file is downloaded to the BIG-IQ system and appears in the
list in the Engine Files List screen. If you chose the download and install option, the
file is pushed to the BIG-IP devices in the cluster and installed on them.
If you did not choose the download and
install option, you need to manually install the updated engine file to complete the
update.
You can check the status of the download by going to
and clicking on the name of the engine file in the list. If you chose
the download and install option, check the status at .Uploading an engine file stored
locally
This procedure requires at least one
BIG-IP® device with Fraud Protection Service discovered on your
BIG-IQ® system.
You can upload a locally stored
JavaScript engine file to the BIG-IQ system if you do not want to download the updated
engine file from the F5 update server.
- At the top of the screen, clickConfiguration.
- On the left, click.The SIGNATURE FILES and ENGINE FILES menus appear.
- In the ENGINE FILES menu, clickEngine File List.
- ClickImport.The Import Engine File screen opens.
- Choose one of the following actions:
- ClickChoose File, and then perform the following steps:
- Navigate to the updated engine file.
- ClickOpen. The file name appears in the Import Engine File screen.
- ClickImportat the bottom of the Import EngineFile screen. The updated file appears in the Engine Files list.
- Drag and drop the updated engine file from its original location to the area labeled Drop Update File Here. The Engine Files list appears, showing the updated file.
Manually install the file to finish
updating the JavaScript engine on the BIG-IP system.
Installing an engine file
Before you can install an engine
file, you must either download the file from the F5 update server
or upload it locally.
Install an engine update file to one
or more BIG-IP® devices to ensure that you have the most up-to-date
protection of your anti-fraud profile on the BIG-IP system.
- At the top of the screen, clickConfiguration.
- On the left, click.The SIGNATURE FILES and ENGINE FILES menus appear.
- In the ENGINE FILES menu, clickEngine File List.
- In the Engine Files list, click the name of the engine file you want to install.The Properties screen for the engine file opens.
- For theInstall to Devicessetting, select the BIG-IP device(s) where you want to install the file.
- From theInstall Tolist, choose whether to install the file on all BIG-IP devices in the cluster or on just the active (primary) devices in the cluster.Once a file is deployed to an active clustered BIG-IP device, a synchronization task will run on the BIG-IP device cluster.
- ClickInstall.The BIG-IQ system pushes the file to the BIG-IP devices that you selected and the file is installed on those devices.
You can check the status of the installation
by going to
and clicking the name of the engine file in the list.Scheduling automatic engine file
updates
This procedure requires at least one
BIG-IP® device with Fraud Protection Service discovered on your
BIG-IQ® system.
Schedule automatic engine file updates to automate
the process of downloading and installing updated engine files according to a specified
time interval.
F5 recommends not using the automatic engine
file update option, and to perform engine file updates manually.
- On the left, click.The SIGNATURE FILES and ENGINE FILES menus appear.
- In the ENGINE FILES menu, clickEngine File List.
- ClickSettings.The Settings screen opens.
- ForRemote Updates, select theEnabledcheck box.
- ForInterval, select a time interval for the automatic update.
- If you chooseCustom, select a time interval from the Custom list.
- ForStarting At, choose a date and time for when the automatic update should start.
- If you are using a proxy, select it from theProxylist.
- From theInstall Tolist, choose whether you want the automatic update to install the engine file on all BIG-IP devices in the cluster or on just the active (primary) devices in the cluster.
- ClickSave & Close.The Engine Files list appears.
- Follow these steps for every BIG-IP device that you want to receive the automatic engine file update:
- Go to.
- Click the device name in the Devices List.The Device Properties screen opens.
- Under Engine File Version, select theAllow Automatic Installcheck box.
- ClickSave & Close.
Automatic engine file updates are
configured, and will begin on the start date that you selected.
You can check the status of the download and
installation by going to
and clicking the name of the engine file in the list.